SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Presented

 By
 Karunvir singh
 Collage kcl-imt
 Jal. Punjab
Intoduction

 Bluetooth
 Implementation
 Communication and connection
 Bluetooth profiles
 List of application
 Devices
 Computer requirements
 Specification and features
BLUETOOTH




Bluetooth is a proprietary open wireless technology standard for exchanging
data over short distances (using short-wavelength radio transmissions in
the ISM band from 2400–2480 MHz) from fixed and mobile
devices, creating personal area networks (PANs) with high levels of security.
Created by telecoms vendor Ericsson in 1994,it was originally conceived as a
wireless alternative to RS-232 data cables. It can connect several devices.
Implementation
 Bluetooth uses a radio technology called frequency-
  hopping spread spectrum, which chops up the data
  being sent and transmits chunks of it on up to 79
  bands (1 MHz each; centered from 2402 to
  2480 MHz) in the range 2,400–2,483.5 MHz
  (allowing for guard bands). This range is in the
  globally unlicensed Industrial, Scientific and Medical
  (ISM) 2.4 GHz short-range radio frequency band. It
  usually performs 800 hops per second, with AFH
  enabled.
Communication and connection

 A master Bluetooth device can communicate
  with a maximum of seven devices in
  a piconet (an ad-hoc computer network using
  Bluetooth technology), though not all devices
  reach this maximum. The devices can switch
  roles, by agreement, and the slave can become
  the master (for example, a headset initiating a
  connection to a phone will necessarily begin as
  master, as initiator of the connection; but may
  subsequently prefer to be slave.
Bluetooth profiles
   To use Bluetooth wireless technology, a device
    has to be able to interpret certain Bluetooth
    profiles, which are definitions of possible
    applications and specify general behaviors that
    Bluetooth enabled devices use to communicate
    with other Bluetooth devices. These profiles
    include settings to control the communication
    from start. Adherence to profiles saves the time
    for transmitting the parameters a new before
    the bi-directional link becomes effective. There
    are a wide range of Bluetooth profiles that
    describe many different types of applications
    or use cases for devices.
List of applications

 A typical Bluetooth mobile phone headset.
 Wireless control of and communication between a mobile
    phone and a handsfree headset. This was one of the earliest
    applications to become popular.
   Wireless control of and communication between a mobile
    phone and a Bluetooth compatible car stereo system
   Wireless Bluetooth headset and Intercom.
   Wireless networking between PCs in a confined space and where
    little bandwidth is required.
   Wireless communication with PC input and output devices, the
    most common being the mouse,keyboard and printer.
   Transfer of files, contact details, calendar appointments, and
    reminders between devices withOBEX.
Devices
 Bluetooth exists in many products, such as
  telephones, tablets, media players, Lego
  Mindstorms PlayStation PSP Go, the and some high
  definition headsets, modems, and watches.[The technology
  is useful when transferring information between two or
  more devices that are near each other in low-bandwidth
  situations. Bluetooth is commonly used to transfer sound
  data with telephones (i.e., with a Bluetooth headset) or
  byte data with hand-held computers (transferring files).
 Bluetooth protocols simplify the discovery and setup of
  services between devices.Bluetooth devices can advertise
  all of the services they provide.This makes using services
  easier because more of the security, network address and
  permission configuration can be automated than with
  many other network types.
Computer requirements

 A personal computer that does not have embedded
  Bluetooth can be used with a Bluetooth adapter that
  will enable the PC to communicate with other
  Bluetooth devices (such as mobile
  phones, miceand keyboards). While some desktop
  computers and most recent laptops come with a
  built-in Bluetooth radio, others will require an
  external one in the form of a dongle.
 Unlike its predecessor, IrDA, which requires a
  separate adapter for each device, Bluetooth allows
  multiple devices to communicate with a computer
  over a single adapter.
Specifications and features

 The Bluetooth specification was developed as a
  cable replacement in 1994 by Jaap Haartsen and
  Sven Mattisson, who were working for Ericsson
  in Lund, Sweden.The specification is based
  on frequency-hopping spread spectrum technology.
 The specifications were formalized by the Bluetooth
  Special Interest Group (SIG). The SIG was formally
  announced on May 20, 1998. Today it has a
  membership of over 16,000 companies worldwide. It
  was established
  by IBM, Intel, Toshiba and Nokia, and later joined by
  many other companies.
Bluetooth v1.1

 Ratified as IEEE Standard 802.15.1-2002
 Many errors found in the 1.0B specifications
  were fixed.
 Added possibility of non-encrypted channels.
 Received Signal Strength Indicator (RSSI).
Thank you

Contenu connexe

Tendances

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technologydima gurov
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentationSushil Thapa
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technologybaralsashank
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)lurdhu agnes
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologyRohit Roy
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetoothhinduyuva
 
Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless TechnologyAman Kumar Dutt
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology Karun Kumar
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth Sana Alvi
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Rohith Raj
 

Tendances (19)

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Blue Tooth Technoloty
Blue Tooth TechnolotyBlue Tooth Technoloty
Blue Tooth Technoloty
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetooth
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless Technology
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Seminar
SeminarSeminar
Seminar
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 

En vedette (7)

Rock metal
Rock metalRock metal
Rock metal
 
Nonogiorno
NonogiornoNonogiorno
Nonogiorno
 
Ευτυχία
ΕυτυχίαΕυτυχία
Ευτυχία
 
Barriers to business in india
Barriers to business in indiaBarriers to business in india
Barriers to business in india
 
Διάθεση
ΔιάθεσηΔιάθεση
Διάθεση
 
Case study saugus eismas
Case study   saugus eismasCase study   saugus eismas
Case study saugus eismas
 
Presentatie Social Media Club Hengelo
Presentatie Social Media Club HengeloPresentatie Social Media Club Hengelo
Presentatie Social Media Club Hengelo
 

Similaire à Bluetooth k.v

Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothKumar
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothmadhu428
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Bit Hacker
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technologyNeha Jella
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetoothvish0110
 
Bluetooth global-technology 170
Bluetooth global-technology 170Bluetooth global-technology 170
Bluetooth global-technology 170manasanreddy
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technologypariluv
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wisher1242
 

Similaire à Bluetooth k.v (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Bluetooth global-technology 170
Bluetooth global-technology 170Bluetooth global-technology 170
Bluetooth global-technology 170
 
Rj bluetooth
Rj bluetoothRj bluetooth
Rj bluetooth
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 

Dernier

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Bluetooth k.v

  • 1. Presented  By  Karunvir singh  Collage kcl-imt  Jal. Punjab
  • 2. Intoduction  Bluetooth  Implementation  Communication and connection  Bluetooth profiles  List of application  Devices  Computer requirements  Specification and features
  • 3. BLUETOOTH Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994,it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices.
  • 4. Implementation  Bluetooth uses a radio technology called frequency- hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to 2480 MHz) in the range 2,400–2,483.5 MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band. It usually performs 800 hops per second, with AFH enabled.
  • 5. Communication and connection  A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-hoc computer network using Bluetooth technology), though not all devices reach this maximum. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but may subsequently prefer to be slave.
  • 6. Bluetooth profiles  To use Bluetooth wireless technology, a device has to be able to interpret certain Bluetooth profiles, which are definitions of possible applications and specify general behaviors that Bluetooth enabled devices use to communicate with other Bluetooth devices. These profiles include settings to control the communication from start. Adherence to profiles saves the time for transmitting the parameters a new before the bi-directional link becomes effective. There are a wide range of Bluetooth profiles that describe many different types of applications or use cases for devices.
  • 7. List of applications  A typical Bluetooth mobile phone headset.  Wireless control of and communication between a mobile phone and a handsfree headset. This was one of the earliest applications to become popular.  Wireless control of and communication between a mobile phone and a Bluetooth compatible car stereo system  Wireless Bluetooth headset and Intercom.  Wireless networking between PCs in a confined space and where little bandwidth is required.  Wireless communication with PC input and output devices, the most common being the mouse,keyboard and printer.  Transfer of files, contact details, calendar appointments, and reminders between devices withOBEX.
  • 8. Devices  Bluetooth exists in many products, such as telephones, tablets, media players, Lego Mindstorms PlayStation PSP Go, the and some high definition headsets, modems, and watches.[The technology is useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with telephones (i.e., with a Bluetooth headset) or byte data with hand-held computers (transferring files).  Bluetooth protocols simplify the discovery and setup of services between devices.Bluetooth devices can advertise all of the services they provide.This makes using services easier because more of the security, network address and permission configuration can be automated than with many other network types.
  • 9. Computer requirements  A personal computer that does not have embedded Bluetooth can be used with a Bluetooth adapter that will enable the PC to communicate with other Bluetooth devices (such as mobile phones, miceand keyboards). While some desktop computers and most recent laptops come with a built-in Bluetooth radio, others will require an external one in the form of a dongle.  Unlike its predecessor, IrDA, which requires a separate adapter for each device, Bluetooth allows multiple devices to communicate with a computer over a single adapter.
  • 10. Specifications and features  The Bluetooth specification was developed as a cable replacement in 1994 by Jaap Haartsen and Sven Mattisson, who were working for Ericsson in Lund, Sweden.The specification is based on frequency-hopping spread spectrum technology.  The specifications were formalized by the Bluetooth Special Interest Group (SIG). The SIG was formally announced on May 20, 1998. Today it has a membership of over 16,000 companies worldwide. It was established by IBM, Intel, Toshiba and Nokia, and later joined by many other companies.
  • 11. Bluetooth v1.1  Ratified as IEEE Standard 802.15.1-2002  Many errors found in the 1.0B specifications were fixed.  Added possibility of non-encrypted channels.  Received Signal Strength Indicator (RSSI).